Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Juniper Networks, Inc. Junos for SRX XLR Platforms

12.3 X48-D30
Product Type
Network and Network Related Devices and Systems
Product Status
Assurance Level
Protection Profile
Product Components
SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, SRX5400E SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-4-15-320
Product Description

The TOE is Juniper Networks, Inc. Junos 12.3X48 for SRX XLR Platforms which primarily supports the definition of and enforces information flow policies among network nodes.  The routers provide for stateful inspection of every packet that traverses the network and provide central management to manage the network security policy.  All information flow from one network node to another passes through an instance of the TOE.  Information flow is controlled on the basis of network node addresses, protocol, type of access requested, and services requested.  In support of the information flow security functions, the TOE ensures that security-relevant activity is audited, that their own functions are protected from potential attacks, and provides the security tools to manage all of the security functions.  The TOE also implements Intrusion Prevention System functionality.  It is capable to monitor information flows to detect potential attacks based on both pre-defined attack signature and anomaly characteristics in the traffic. The TOE shall provide authentication ability (IPSec) to allow a VPN peer to establish VPN connectivity with another VPN peer. VPN endpoints authenticate each other to ensure they are communicating with an authorised external IT entity.


Evaluated Configuration of the TOE

Software Junos 12.3X48-D30
Hardware Platforms

SRX100, SRX110, SRX210, SRX220, SRX240, SRX550 and SRX650; SRX5400, SRX5400E, SRX5600, SRX5600E, SRX5800 and SRX5800E with SPC-4-15-320


The security functions performed by the TOE are as follows:

  • Security Audit
  • Cryptographic Support
  • User Data Protection
  • Identification and Authentication
  • Security Management
  • Protection of the TSF
  • TOE Access
  • Trusted Path/Channel
  • Stateful Firewall/Packet Filtering (FWEP & VPNEP)
  • Intrusion Prevention System